panic: malformed IPv4 option passed to ip_optcopy Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND *144050 58659 32767 0x10 0x4000000 1 syz-executor0 32007 81802 32767 0x10 0x480 0 syz-executor1 db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 ip_fragment(a9d430c468d613c1,ffffff007ba11dd9,ffff800000173290) at ip_fragment+0x625 ip_output(7f1c6ff1f25eee80,ffffff006f4aa690,ffffff007ba11d00,0,ffffff007ba11600,ffffff006e8d3d88) at ip_output+0xc8d sys/netinet/ip_output.c:501 udp_output(f63b9f292ee60909,1400,ffffff006e8d3d88,0) at udp_output+0x45a sys/netinet/udp_usrreq.c:1004 sosend(c18a0cc717f25fb2,ffffff0069de2780,ffff800021062e28,1000,ffff800021062e28,ffff800021062e48) at sosend+0x47a sys/kern/uipc_socket.c:513 sendit(e3941a0876126cf8,ffff8000211b3308,ffff8000211b32f0,1,ffff800021062e28) at sendit+0x431 sys/kern/uipc_syscalls.c:662 sys_sendto(dd2817293617b30,850,ffff800021062e28) at sys_sendto+0x88 syscall(81d2d56869273b71) at syscall+0x496 mi_syscall sys/sys/syscall_mi.h:99 [inline] syscall(81d2d56869273b71) at syscall+0x496 sys/arch/amd64/amd64/trap.c:583 Xsyscall(6,0,ffffffffffffffd5,0,6,ba064c7f0d8) at Xsyscall+0x128 end of kernel end trace frame: 0xba28c1f3230, count: 5 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb{1}> ddb{1}> set $lines = 0 ddb{1}> show panic malformed IPv4 option passed to ip_optcopy ddb{1}> trace db_enter() at db_enter+0x18 sys/arch/amd64/amd64/db_interface.c:399 panic() at panic+0x147 sys/kern/subr_prf.c:208 ip_fragment(a9d430c468d613c1,ffffff007ba11dd9,ffff800000173290) at ip_fragment+0x625 ip_output(7f1c6ff1f25eee80,ffffff006f4aa690,ffffff007ba11d00,0,ffffff007ba11600,ffffff006e8d3d88) at ip_output+0xc8d sys/netinet/ip_output.c:501 udp_output(f63b9f292ee60909,1400,ffffff006e8d3d88,0) at udp_output+0x45a sys/netinet/udp_usrreq.c:1004 sosend(c18a0cc717f25fb2,ffffff0069de2780,ffff800021062e28,1000,ffff800021062e28,ffff800021062e48) at sosend+0x47a sys/kern/uipc_socket.c:513 sendit(e3941a0876126cf8,ffff8000211b3308,ffff8000211b32f0,1,ffff800021062e28) at sendit+0x431 sys/kern/uipc_syscalls.c:662 sys_sendto(dd2817293617b30,850,ffff800021062e28) at sys_sendto+0x88 syscall(81d2d56869273b71) at syscall+0x496 mi_syscall sys/sys/syscall_mi.h:99 [inline] syscall(81d2d56869273b71) at syscall+0x496 sys/arch/amd64/amd64/trap.c:583 Xsyscall(6,0,ffffffffffffffd5,0,6,ba064c7f0d8) at Xsyscall+0x128 end of kernel end trace frame: 0xba28c1f3230, count: -10 ddb{1}> show registers rdi 0xffffffff81f00128 kprintf_mutex rsi 0xffffffff81150e07 db_enter+0x17 rbp 0xffff8000211b2e20 rbx 0xffff8000211b2ec0 rdx 0xffff800004146000 rcx 0x163e __ALIGN_SIZE+0x63e rax 0xffff800004146000 r8 0xffff8000211b2df0 r9 0 r10 0x714850b72f9b8824 r11 0x9c460d6af5b6c63 r12 0x3000000008 r13 0xffff8000211b2e30 r14 0x100 r15 0xffffffff81cd528d apollo_udma100_tim+0xde73 rip 0xffffffff81150e08 db_enter+0x18 cs 0x8 rflags 0x246 rsp 0xffff8000211b2e10 ss 0x10 db_enter+0x18: addq $0x8,%rsp ddb{1}> show proc PROC (syz-executor0) pid=144050 stat=onproc flags process=10 proc=4000000 pri=86, usrpri=86, nice=20 forw=0xffffffffffffffff, list=0xffff800021062720,0xffffffff81f8d720 process=0xffff80002109a360 user=0xffff8000211ae000, vmspace=0xffffff0065cf9640 estcpu=36, cpticks=1, pctcpu=0.0 user=0, sys=1, intr=0 ddb{1}> ps PID TID PPID UID S FLAGS WAIT COMMAND 58659 486530 91625 32767 2 0x10 syz-executor0 58659 22249 91625 32767 3 0x4000090 netio syz-executor0 *58659 144050 91625 32767 7 0x4000010 syz-executor0 81802 32007 49632 32767 7 0x490 syz-executor1 81802 199153 49632 32767 3 0x4000090 fsleep syz-executor1 81802 401322 49632 32767 3 0x4000090 ttyout syz-executor1 81802 451893 49632 32767 3 0x4000090 fsleep syz-executor1 49632 372212 23452 32767 2 0x490 syz-executor1 23452 500775 51242 0 3 0x82 wait syz-executor1 91625 226946 81139 32767 2 0x490 syz-executor0 81139 311618 51242 0 3 0x82 wait syz-executor0 10285 113818 0 0 3 0x14200 bored sosplice 51242 437380 10018 0 3 0x82 thrsleep syz-fuzzer 51242 336255 10018 0 3 0x4000082 thrsleep syz-fuzzer 51242 376292 10018 0 3 0x4000082 thrsleep syz-fuzzer 51242 51700 10018 0 3 0x4000082 thrsleep syz-fuzzer 51242 143976 10018 0 3 0x4000082 thrsleep syz-fuzzer 51242 284357 10018 0 3 0x4000082 thrsleep syz-fuzzer 51242 254010 10018 0 3 0x4000082 kqread syz-fuzzer 51242 507643 10018 0 3 0x4000082 thrsleep syz-fuzzer 51242 408466 10018 0 3 0x4000082 thrsleep syz-fuzzer 51242 266198 10018 0 3 0x4000082 thrsleep syz-fuzzer 10018 356299 62213 0 3 0x10008a pause ksh 62213 322932 3368 0 3 0x92 select sshd 24709 126018 1 0 3 0x100083 ttyin getty 3368 195987 1 0 3 0x80 select sshd 79187 327755 53987 73 3 0x100090 kqread syslogd 53987 444283 1 0 3 0x100082 netio syslogd 58067 324263 1 77 3 0x100090 poll dhclient 1104 455812 1 0 3 0x80 poll dhclient 81657 220718 0 0 3 0x14200 pgzero zerothread 7245 298311 0 0 3 0x14200 aiodoned aiodoned 2822 406409 0 0 3 0x14200 syncer update 37807 359398 0 0 3 0x14200 cleaner cleaner 2510 51297 0 0 3 0x14200 reaper reaper 3586 451016 0 0 3 0x14200 pgdaemon pagedaemon 29665 474366 0 0 3 0x14200 bored crynlk 32048 150343 0 0 3 0x14200 bored crypto 13573 520928 0 0 3 0x40014200 acpi0 acpi0 22679 104600 0 0 3 0x40014200 idle1 15400 62851 0 0 3 0x14200 bored softnet 97968 43869 0 0 3 0x14200 bored systqmp 47327 173736 0 0 3 0x14200 bored systq 12186 42181 0 0 3 0x40014200 bored softclock 80159 436528 0 0 3 0x40014200 idle0 1 429594 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper